首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5篇
  免费   0篇
教育   5篇
  2006年   3篇
  2004年   1篇
  2003年   1篇
排序方式: 共有5条查询结果,搜索用时 250 毫秒
1
1.
1IntroductionIntrusion detection systems(IDS)can be catego-rizedinto two types bytheir detection algorithms:mis-use detection and anomaly detection.Misuse detectiondefines known attack signatures(using expert know-ledge),and tries to find the ones that ma…  相似文献   
2.
It is expected that by 2003 continuous media will account for more than 50% of the data available on origin servers, this will provoke a significant change in Internet workload. Due to the high bandwidth requirements and the long-lived nature of digital video, streaming server loads and network bandwidths are proven to be major limiting factors. Aiming at the characteristics of broadband network in residential areas, this paper proposes a popularity-based server-proxy caching strategy for streaming media. According to a streaming media popularity on streaming server and proxy, this strategy caches the content of the streaming media partially or completely. The paper also proposes two formulas that calculate the popularity coefficient of a streaming media on server and proxy, and caching replacement policy. As expected, this strategy decreases the server load, reduces the traffic from streaming server to proxy, and improves client start-up latency.  相似文献   
3.
HUSTserver:一种可靠的高性能附网存储系统的实现   总被引:2,自引:0,他引:2  
1 Introduction Emergingapplicationssuchasdatawarehousing ,multimediacontentdistribution ,electroniccom merce ,medicaldatabaseandsatellitedatabaseshavesubstantialstoragerequirementsthataregrowingatadramaticallyrate .Suchapplicationsrequirescalable ,highly availableandcost effectivestoragesystems .Traditionalstoragesystemsrelyonacentralcon troller (fileserver ,diskarraycontroller)toaccessstorageandcopydatabetweenstoragedevicesandclients,whichlimitstheirscalability .Withthedra maticshifttowards…  相似文献   
4.
An application-layer based centralized information access control for VPN   总被引:3,自引:0,他引:3  
INTRODUCTION AND BACKGROUND In the last decade, as the Internet becomes a popular low-cost backbone infrastructure, many or- ganizations and companies use it to establish their secure private network, which is known as VPN (Virtual Private Network) technology (Cohen, 2003). Generally, VPN implements confidentiality of data, message integrity and endpoint authentication by the security protocols (such as IPSec: IP Security (Kent and Atkinson, 1998) and TLS/SSL: Transport Lay…  相似文献   
5.
1Introduction Thispaperfocusesondevelopingalogicalhierarchi calcluster(LHC)foreachblockofmultimediaobjects asthedecentralizedarchitectureofthedistributed multimediaondemand(DMoD)server.Becausethe aggregatedbandwidthrequirementofthegeographical lydistributedusersisincreasingbeyondthecapacityof thenetworkbackbone,theDMoDschemeisproposed todistributetheloadoftheinteractiveMoDserviceto thenodeslocatedatthedifferentgeographical admini strativeregions.ThenetworktopologyG(V,E)and theresourceman…  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号